-
1
-
-
0034557459
-
Research Report: The Evolving Relationship Between General and Specific Computer Self-Efficacy - An Empirical Assessment
-
Agarwal, R., V. Sambamurthy, and R. M. Stair (2000) Research Report: The Evolving Relationship Between General and Specific Computer Self-Efficacy - An Empirical Assessment, Information Systems Research (11) 4, pp. 418-430.
-
(2000)
Information Systems Research
, vol.4
, Issue.11
, pp. 418-430
-
-
Agarwal, R.1
Sambamurthy, V.2
Stair, R.M.3
-
2
-
-
58149324506
-
Statistical power problems with moderated multiple regression in management research
-
Aguinis, H. (1995) Statistical power problems with moderated multiple regression in management research, Journal of Management (21) 6, pp. 1141-1158.
-
(1995)
Journal of Management
, vol.6
, Issue.21
, pp. 1141-1158
-
-
Aguinis, H.1
-
6
-
-
77955115473
-
Practicing Safe Computing: Message Framing, Self-View, and Home Computer User Security Behavior Intentions
-
Milwaukee, WI
-
Anderson, C. L. and R. Agarwal (2006) Practicing Safe Computing: Message Framing, Self-View, and Home Computer User Security Behavior Intentions, in International Conference on Information Systems, pp. 1543-1561. Milwaukee, WI.
-
(2006)
International Conference On Information Systems
, pp. 1543-1561
-
-
Anderson, C.L.1
Agarwal, R.2
-
7
-
-
2642549662
-
Computer security and risky computing practices: A rational choice perspective
-
Aytes, K. and C. Terry (2004) Computer security and risky computing practices: A rational choice perspective, Journal of Organizational and End User Computing (16) 3, pp. 22-40.
-
(2004)
Journal of Organizational and End User Computing
, vol.3
, Issue.16
, pp. 22-40
-
-
Aytes, K.1
Terry, C.2
-
8
-
-
30744434347
-
An analysis of the growth of computer and internet security breaches
-
Bagchi, K. and G. Udo (2003) An analysis of the growth of computer and internet security breaches, Communications of the AIS (12), pp. 684-700.
-
(2003)
Communications of The AIS
, Issue.12
, pp. 684-700
-
-
Bagchi, K.1
Udo, G.2
-
9
-
-
0017472917
-
Self-efficacy: Toward a unifying theory of behavior change
-
Bandura, A. (1977) Self-efficacy: Toward a unifying theory of behavior change, Psychological Review (84). 191-215.
-
(1977)
Psychological Review
, Issue.84
, pp. 191-215
-
-
Bandura, A.1
-
10
-
-
33746878674
-
Self-efficacy mechanism in human agency
-
Bandura, A. (1982) Self-efficacy mechanism in human agency, American Psychologist 37, pp. 122-147.
-
(1982)
American Psychologist
, vol.37
, pp. 122-147
-
-
Bandura, A.1
-
11
-
-
0023020183
-
The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations
-
Baron, R. and D. Kenny (1986) The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations, J Person Soc Psych (51) 6, pp. 1173-1182.
-
(1986)
J Person Soc Psych
, vol.6
, Issue.51
, pp. 1173-1182
-
-
Baron, R.1
Kenny, D.2
-
12
-
-
0026398826
-
Risk analysis as a source of professional knowledge
-
Baskerville, R. (1991) Risk analysis as a source of professional knowledge, Computer & Security (10) 8, pp. 749-764.
-
(1991)
Computer & Security
, vol.8
, Issue.10
, pp. 749-764
-
-
Baskerville, R.1
-
13
-
-
0013324190
-
Risk analysis: An interpretive feasibility tool in justifying information systems security
-
Baskerville, R. (1991) Risk analysis: an interpretive feasibility tool in justifying information systems security, European Journal of Information Systems (1) 2, pp. 121-130.
-
(1991)
European Journal of Information Systems
, vol.2
, Issue.1
, pp. 121-130
-
-
Baskerville, R.1
-
14
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Baskerville, R. (1993) Information systems security design methods: implications for information systems development, ACM Computing Surveys (25) 4, pp. 375-414.
-
(1993)
ACM Computing Surveys
, vol.4
, Issue.25
, pp. 375-414
-
-
Baskerville, R.1
-
15
-
-
33645301638
-
Understanding user responses to information technology: A coping model of user adaptation
-
Beaudry, A. and A. Pinsonneault (2005) Understanding user responses to information technology: A coping model of user adaptation, MIS Quarterly (29) 3, pp. 493-524.
-
(2005)
MIS Quarterly
, vol.3
, Issue.29
, pp. 493-524
-
-
Beaudry, A.1
Pinsonneault, A.2
-
16
-
-
0000937373
-
On theory, statistics, and the search for interactions in the organizational sciences
-
Bobko, P. and C. J. Russell (1994) On theory, statistics, and the search for interactions in the organizational sciences, Journal of Management (20), pp. 193-200.
-
(1994)
Journal of Management
, Issue.20
, pp. 193-200
-
-
Bobko, P.1
Russell, C.J.2
-
17
-
-
2942675541
-
In Pursuit of Moderation: Nine Common Errors and Their Solutions
-
Carte, T. and C. Russell (2003) In Pursuit of Moderation: Nine Common Errors and Their Solutions, MIS Quarterly (27) 3, pp. 479-501.
-
(2003)
MIS Quarterly
, vol.3
, Issue.27
, pp. 479-501
-
-
Carte, T.1
Russell, C.2
-
18
-
-
0020157678
-
Control theory: A useful conceptual framework for personalitysocial, clinical, and health psychology
-
Carver, C. S. and M. F. Scheier (1982) Control theory: A useful conceptual framework for personalitysocial, clinical, and health psychology, Psychological Bulletin (92) 1, pp. 111-135.
-
(1982)
Psychological Bulletin
, vol.1
, pp. 111-135
-
-
Carver, C.S.1
Scheier, M.F.2
-
19
-
-
0031261428
-
Reliability and validity of breast cancer screening belief scales in African American women
-
Champion, V. and C. Scott (1997) Reliability and validity of breast cancer screening belief scales in African American women, Nursing Research (46) 6, pp. 331-337.
-
(1997)
Nursing Research
, vol.6
, Issue.46
, pp. 331-337
-
-
Champion, V.1
Scott, C.2
-
20
-
-
0344527939
-
Influence of computer attitude and self-efficacy on IT usage behavior
-
Chau, P. Y. K. (2001) Influence of computer attitude and self-efficacy on IT usage behavior, Journal of End User Computing (13) 1, pp. 26.
-
(2001)
Journal of End User Computing
, vol.1
, Issue.13
, pp. 26
-
-
Chau, P.Y.K.1
-
21
-
-
0042242856
-
A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic Mail Emotion/Adoption Study
-
Chin, W. W., B. L. Marcolin, and P. R. Newsted (2003) A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic Mail Emotion/Adoption Study, Information Systems Research (14) 2, pp. 189-217.
-
(2003)
Information Systems Research
, vol.2
, Issue.14
, pp. 189-217
-
-
Chin, W.W.1
Marcolin, B.L.2
Newsted, P.R.3
-
23
-
-
49149116092
-
Computer self-efficacy: Development of a measue and initial test
-
Compeau, D. R. and C. A. Higgins (1995) Computer self-efficacy: development of a measue and initial test, MIS Quarterly (19), pp. 189-211.
-
(1995)
MIS Quarterly
, Issue.19
, pp. 189-211
-
-
Compeau, D.R.1
Higgins, C.A.2
-
24
-
-
0000004470
-
Social cognitive theory and individual reactions to computing technology: A longitudinal study
-
Compeau, D. R., C. A. Higgins, and S. Huff (1999) Social cognitive theory and individual reactions to computing technology: a longitudinal study, MIS Quarterly (23) 2, pp. 145-158.
-
(1999)
MIS Quarterly
, vol.2
, Issue.23
, pp. 145-158
-
-
Compeau, D.R.1
Higgins, C.A.2
Huff, S.3
-
25
-
-
85080719040
-
-
Consumer Reports., Consumer Reports National Research Center
-
Consumer Reports. (2009) State of the Net 2009. Consumer Reports National Research Center.
-
(2009)
State of The Net 2009
-
-
-
26
-
-
33748435812
-
-
CSI, Computer Security Institute
-
CSI. (2009) Computer crime & security survey 2009. Computer Security Institute.
-
(2009)
Computer Crime & Security Survey
-
-
-
27
-
-
67649551429
-
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
-
D'Arcy, J., A. Hovav, and D. F. Galletta (2009) User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach, Information Systems Research (20) 1, pp. 79-98.
-
(2009)
Information Systems Research
, vol.1
, Issue.20
, pp. 79-98
-
-
D'arcy, J.1
Hovav, A.2
Galletta, D.F.3
-
28
-
-
55249087535
-
Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology
-
Davis, F. D. (1989) Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly (13) 3, pp. 319-338.
-
(1989)
MIS Quarterly
, vol.3
, Issue.13
, pp. 319-338
-
-
Davis, F.D.1
-
29
-
-
84936823933
-
User Acceptance of Computer Technology: A Comparison of Two Theoretical Models
-
Davis, F. D., R. P. Bagozzi, and P. R. Warshaw (1989) User Acceptance of Computer Technology: A Comparison of Two Theoretical Models, Management Science (35) 8, pp. 982-1003.
-
(1989)
Management Science
, vol.8
, Issue.35
, pp. 982-1003
-
-
Davis, F.D.1
Bagozzi, R.P.2
Warshaw, P.R.3
-
30
-
-
85080724618
-
-
US Census Bureau
-
Day, J. C., A. Janus, and J. Davis. (2005) Computer and Internet Use in the United States: 2003. US Census Bureau.
-
(2005)
And
-
-
Day, J.C.1
Janus, A.2
-
31
-
-
0002698747
-
Information system security management in the new millennium
-
Dhillon, G. and J. Backhouse (2000) Information system security management in the new millennium, Communications of the ACM (43) 7, pp. 125-128.
-
(2000)
Communications of The ACM
, vol.7
, Issue.43
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
32
-
-
0001285417
-
A cybernetic theory of stress, coping, and well-being in organizations
-
Edwards, J. (1992) A cybernetic theory of stress, coping, and well-being in organizations, Academy of Management Review (17) 2, pp. 238-274.
-
(1992)
Academy of Management Review
, vol.2
, Issue.17
, pp. 238-274
-
-
Edwards, J.1
-
33
-
-
0003551671
-
Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research
-
MA: Addison-Wesley
-
Fishbein, M. and I. Ajzen (1975) Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley.
-
(1975)
Reading
-
-
Fishbein, M.1
Ajzen, I.2
-
34
-
-
0000356178
-
Two Structural Equation Models: LISREL and PLS Applied to Consumer Exit-Voice Theory
-
Fornell, C. and F. L. Bookstein (1982) Two Structural Equation Models: LISREL and PLS Applied to Consumer Exit-Voice Theory, Journal of Marketing Research 19pp. 440-452.
-
(1982)
Journal of Marketing Research
, Issue.19
, pp. 440-452
-
-
Fornell, C.1
Bookstein, F.L.2
-
35
-
-
0000009769
-
Evaluating Structural Equation Models with Unobservable Variables and Measurement Error
-
Fornell, C. and D. F. Larcker (1981) Evaluating Structural Equation Models with Unobservable Variables and Measurement Error, Journal of Marketing Research (18) 1, pp. 39-50.
-
(1981)
Journal of Marketing Research
, vol.1
, Issue.18
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
-
36
-
-
0002464435
-
-
vol. XIVComplete psychological works of Sigmund Freud, London: Hogarth
-
Freud, S. (1915) Repression, in, vol. XIVComplete psychological works of Sigmund Freud, London: Hogarth.
-
(1915)
Repression
-
-
Freud, S.1
-
37
-
-
0001178032
-
Structural equation modeling and regression: Guidelines for research practice
-
Gefen, D., D. Straub, and M. Boudreau (2000) Structural equation modeling and regression: guidelines for research practice, Communications of the AIS (4) 7.
-
(2000)
Communications of The AIS
, Issue.4
, pp. 7
-
-
Gefen, D.1
Straub, D.2
Boudreau, M.3
-
39
-
-
0002812554
-
Trust and the virtual organization
-
Handy, C. (1995) Trust and the virtual organization, Harvard Business Review (73) 3, pp. 40-50.
-
(1995)
Harvard Business Review
, vol.3
, Issue.73
, pp. 40-50
-
-
Handy, C.1
-
41
-
-
0021397380
-
The health belief model: A decade later
-
Janz, N. K. and M. H. Becker (1984) The health belief model: a decade later, Health Education Quarterly (11) 1, pp. 1-45.
-
(1984)
Health Education Quarterly
, vol.1
, Issue.11
, pp. 1-45
-
-
Janz, N.K.1
Becker, M.H.2
-
45
-
-
33847761422
-
Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management
-
Liang, H., N. Saraf, Q. Hu, and Y. Xue (2007) Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management, MIS Quarterly, 31(1), 59-7.
-
(2007)
MIS Quarterly
, vol.31
, Issue.1
, pp. 59-57
-
-
Liang, H.1
Saraf, N.2
Hu, Q.3
Xue, Y.4
-
46
-
-
60649084770
-
Avoidance of information technology threats: A theoretical perspective
-
Liang, H. and Y. Xue (2009) Avoidance of information technology threats: A theoretical perspective, MIS Quarterly (33) 1, pp. 71-90.
-
(2009)
MIS Quarterly
, vol.1
, Issue.33
, pp. 71-90
-
-
Liang, H.1
Xue, Y.2
-
47
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
Loch, K. D., H. H. Carr, and M. E. Warkentin (1992) Threats to information systems: Today's reality, yesterday's understanding, MIS Quarterly (16) 2, pp. 173-186.
-
(1992)
MIS Quarterly
, vol.2
, Issue.16
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
48
-
-
0000242433
-
Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change
-
Maddus, J. E. and R. W. Rogers (1983) Protection motivation and self-efficacy: a revised theory of fear appeals and attitude change, Journal of Experimental Social Psychology (19), pp. 469-479.
-
(1983)
Journal of Experimental Social Psychology
, Issue.19
, pp. 469-479
-
-
Maddus, J.E.1
Rogers, R.W.2
-
49
-
-
58149425798
-
A Theory of Human Motivation
-
Maslow, A. H. (1943) A Theory of Human Motivation, Psychological Review (50) 4, pp. 370-396.
-
(1943)
Psychological Review
, vol.4
, Issue.50
, pp. 370-396
-
-
Maslow, A.H.1
-
50
-
-
0036106081
-
Combining Motivational and Volitional Interventions to Promote Exercise Participation: Protection Motivation Theory and Implementation Intentions
-
Milne, S., S. Orbell, and P. Sheeran (2002) Combining Motivational and Volitional Interventions to Promote Exercise Participation: Protection Motivation Theory and Implementation Intentions, British Journal of Health Psychology (7), pp. 163-184.
-
(2002)
British Journal of Health Psychology
, Issue.7
, pp. 163-184
-
-
Milne, S.1
Orbell, S.2
Sheeran, P.3
-
51
-
-
61349092288
-
Studying users' computer security behavior: A health belief perspective
-
Ng, B.-Y., A. Kankanhalli, and Y. C. Xu (2009) Studying users' computer security behavior: A health belief perspective, Decision Support System (46) 4, pp. 815-825.
-
(2009)
Decision Support System
, vol.4
, Issue.46
, pp. 815-825
-
-
Ng, B.-Y.1
Kankanhalli, A.2
Xu, Y.C.3
-
52
-
-
0003528130
-
-
2nd edition. New York: McGraw-Hill
-
Nunnally, J. (1978) Psychometric theory, 2nd edition. New York: McGraw-Hill.
-
(1978)
Psychometric Theory
-
-
Nunnally, J.1
-
53
-
-
0141907688
-
Common method biases in behavioral research: A critical review of the literature and recommended remedies
-
Podsakoff, P. M., S. B. MacKenzie, J. Y. Lee, and N. P. Podsakoff (2003) Common method biases in behavioral research: a critical review of the literature and recommended remedies, Journal of Applied Psychology (88) 5, pp. 879-903.
-
(2003)
Journal of Applied Psychology
, vol.5
, Issue.88
, pp. 879-903
-
-
Podsakoff, P.M.1
Mackenzie, S.B.2
Lee, J.Y.3
Podsakoff, N.P.4
-
54
-
-
84970235764
-
Self-reports in organizational research: Problems and prospects
-
Podsakoff, P. M. and D. W. Organ (1986) Self-reports in organizational research: problems and prospects, Journal of Management (12) 4, pp. 531-544.
-
(1986)
Journal of Management
, vol.4
, Issue.12
, pp. 531-544
-
-
Podsakoff, P.M.1
Organ, D.W.2
-
55
-
-
56749152239
-
-
Hamburg, Germany
-
Ringle, C. M., S. Wende, and A. Will (2005) SmartPLS, 2.0 (beta) edition. Hamburg, Germany.
-
(2005)
SmartPLS, 2.0 (beta) Edition
-
-
Ringle, C.M.1
Wende, S.2
Will, A.3
-
56
-
-
0023304222
-
Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat
-
Rippetoe, P. A. and R. W. Rogers (1987) Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat, Journal of Personality and Social Psychology (52) 3, pp. 596-604.
-
(1987)
Journal of Personality and Social Psychology
, vol.3
, Issue.52
, pp. 596-604
-
-
Rippetoe, P.A.1
Rogers, R.W.2
-
57
-
-
0001840352
-
A protection motivation theory of fear appeals and attitude change
-
Rogers, R. W. (1975) A protection motivation theory of fear appeals and attitude change, Journal of Psychology (91), pp. 93-114.
-
(1975)
Journal of Psychology
, Issue.91
, pp. 93-114
-
-
Rogers, R.W.1
-
59
-
-
84973751588
-
The health belief model and preventive health behavior
-
Rosenstock, I. M. (1974) The health belief model and preventive health behavior, Health Education Monographs 2pp. 354-386.
-
(1974)
Health Education Monographs
, Issue.2
, pp. 354-386
-
-
Rosenstock, I.M.1
-
60
-
-
0034380992
-
Health beliefs about mental illness: An instrument development study
-
Saleeby, J. R. (2000) Health beliefs about mental illness: an instrument development study, American Journal of Health Behavior (24) 2, pp. 83-95.
-
(2000)
American Journal of Health Behavior
, vol.2
, Issue.24
, pp. 83-95
-
-
Saleeby, J.R.1
-
61
-
-
0038780931
-
Pandora's box: Spyware, adware, autoexecution, and NGSCB
-
Schultz, E. (2003) Pandora's box: spyware, adware, autoexecution, and NGSCB, Computer & Security (22) 5, pp. 366-367.
-
(2003)
Computer & Security
, vol.5
, Issue.22
, pp. 366-367
-
-
Schultz, E.1
-
62
-
-
0141458141
-
Spyware & Adware: The Risks facing Businesses
-
Shaw, G. (2003) Spyware & Adware: the Risks facing Businesses, Network Security (2003) 9, pp. 12-14.
-
(2003)
Network Security (2003)
, vol.9
, pp. 12-14
-
-
Shaw, G.1
-
63
-
-
15744395148
-
The ethical and legal concerns of spyware
-
Sipior, J. C., B. T. Ward, and G. R. Roselli (2005) The ethical and legal concerns of spyware, Information Systems Management (22) 2, pp. 39-49.
-
(2005)
Information Systems Management
, vol.2
, Issue.22
, pp. 39-49
-
-
Sipior, J.C.1
Ward, B.T.2
Roselli, G.R.3
-
64
-
-
0000981743
-
Information privacy: Measuring individuals' concerns about organizational practices
-
Smith, H., S. Milberg, and S. Burke (1996) Information privacy: measuring individuals' concerns about organizational practices, MIS Quarterly (20) 2, pp. 167-196.
-
(1996)
MIS Quarterly
, vol.2
, Issue.20
, pp. 167-196
-
-
Smith, H.1
Milberg, S.2
Burke, S.3
-
66
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D. and R. Welke (1998) Coping with systems risk: security planning models for management decision making, MIS Quarterly (22) 4, pp. 441-469.
-
(1998)
MIS Quarterly
, vol.4
, Issue.22
, pp. 441-469
-
-
Straub, D.1
Welke, R.2
-
67
-
-
0002735809
-
The protection motivation model: A normative model of fear appeals
-
Tanner, J. F., J. B. Hunt, and D. R. Eppright (1991) The protection motivation model: a normative model of fear appeals, Journal of Marketing (55), pp. 36-45.
-
(1991)
Journal of Marketing
, Issue.55
, pp. 36-45
-
-
Tanner, J.F.1
Hunt, J.B.2
Eppright, D.R.3
-
68
-
-
0034559541
-
Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model
-
Venkatesh, V. (2000) Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model, Information Systems Research (11) 4, pp. 342-365.
-
(2000)
Information Systems Research
, vol.4
, Issue.11
, pp. 342-365
-
-
Venkatesh, V.1
-
69
-
-
1542382496
-
User acceptance of information technology: Toward a unified view
-
Venkatesh, V., M. G. Morris, G. B. Davis, and F. D. Davis (2003) User acceptance of information technology: toward a unified view, MIS Quarterly (27) 3, pp. 425-478.
-
(2003)
MIS Quarterly
, vol.3
, Issue.27
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
-
70
-
-
77955101093
-
IT Security Governance and Centralized Security Controls
-
M. Warkentin and R. Vaughn (Eds.), Hershey, PA: Idea Group Publishing
-
Warkentin, M. and A. C. Johnston (2006) IT Security Governance and Centralized Security Controls, in M. Warkentin and R. Vaughn (Eds.) Enterprise Information Assurance and System Security: Managerial and Technical Issues, Hershey, PA: Idea Group Publishing, pp. 16-24.
-
(2006)
Enterprise Information Assurance and System Security: Managerial and Technical Issues
, pp. 16-24
-
-
Warkentin, M.1
Johnston, A.C.2
-
71
-
-
0027633395
-
Testing four competing theories of health-protective behavior
-
Weinstein, N. D. (1993) Testing four competing theories of health-protective behavior, Health Psychology (12) 4, pp. 324-333.
-
(1993)
Health Psychology
, vol.4
, Issue.12
, pp. 324-333
-
-
Weinstein, N.D.1
-
72
-
-
0033768584
-
Perceived probability, perceived severity, and health-protective behavior
-
Weinstein, N. D. (2000) Perceived probability, perceived severity, and health-protective behavior, Health Psychology (19) 1, pp. 65-74.
-
(2000)
Health Psychology
, vol.1
, Issue.19
, pp. 65-74
-
-
Weinstein, N.D.1
-
73
-
-
0344873690
-
Recent advances in causal modeling methods for organizational and management research
-
Williams, L. J., J. R. Edwards, and R. J. Vandenberg (2003) Recent advances in causal modeling methods for organizational and management research, Journal of Management (29) 6, pp. 903-936.
-
(2003)
Journal of Management
, vol.6
, Issue.29
, pp. 903-936
-
-
Williams, L.J.1
Edwards, J.R.2
Vandenberg, R.J.3
-
74
-
-
84869780575
-
A Protection Motivation Theory Approach to Home Wireless Security
-
Las Vegas, NV
-
Woon, I., G. W. Tan, and R. Low (2005) A Protection Motivation Theory Approach to Home Wireless Security, in International Conference on Information Systems, pp. 367-380. Las Vegas, NV.
-
(2005)
International Conference On Information Systems
-
-
Woon, I.1
Tan, G.W.2
Low, R.3
-
75
-
-
51349158689
-
Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test
-
Workman, M., W. H. Bommer, and D. Straub (2008) Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test, Computers in Human Behavior (24) 6, pp. 2799-2816.
-
(2008)
Computers In Human Behavior
, vol.6
, Issue.24
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.3
|